Wednesday, 5 August 2015 |
08:00 – 10:00 |
S018: Mobile authentication and access control: Security and usability of smartphones, sensors and embedded systems Chair(s): Theo Tryfonas, University of Bristol, United Kingdom Room: SAN FERNANDO |
- Real-time Monitoring of Privacy Abuses and Intrusion Detection in Android System
Shancang Li, Edinburgh Napier University, United Kingdom; Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, University of Bristol, United Kingdom; Robert Ludwiniak, Gordon Russell, Edinburgh Napier University, United Kingdom.
- Messaging Activity Reconstruction with Sentiment Polarity Identification
Panagiotis Andriotis, George Oikonomou, University of Bristol, United Kingdom.
- Exploring the Adoption of Physical Security Controls in Smartphones
Nasser Alshammari, Staffordshire University, Saudi Arabia; Alexios Mylonas, Mohamed Sedky, Justin Champion, Carolin Bauer, Staffordshire University, United Kingdom.
- Predicting Graphical Passwords
Matthieu Devlin, Jason Nurse, University of Oxford, United Kingdom; Duncan Hodges, Cranfield University, United Kingdom; Michael Goldsmith, Sadie Creese, University of Oxford, United Kingdom.
- An Extensible Platform for the Forensic Analysis of Social Media Data
Huw Read, Konstantinos Xynos, University of South Wales, Pontypridd, CF37 1DL, UK, United Kingdom; Iain Sutherland, Noroff University, Norway; Frode Roarson, Noroff University College, 4608 Kristiansand, Norway, United Kingdom; Panagiotis Andriotis, George Oikonomou, University of Bristol, United Kingdom.
Top |
10:30 – 12:30 |
S041: Considering Privacy & Security in Health, Education, Communication, and E-commerce: Approaches to Design and Policy Development Chair(s): Theo Tryfonas, University of Bristol, United Kingdom Room: SAN FERNANDO |
- Do Graphical Cues Effectively Inform Users? A Socio-technical Security Study in Accessing WiFi Networks
Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas, University of Luxembourg, Luxembourg.
- Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security
David Schuster, Mary Still, Jeremiah Still, San José State University, United States; Ji Jung Lim, Intel Security, United States; Cary Feria, San José State University, United States; Christian P. Rohrer, Intel Security, United States.
- Pervasive Monitoring as an Insider Threat: An Adapted Model
Dana Polatin-Reuben, University of Oxford, United Kingdom.
- An Identification of Variables Influencing the Establishment of Information Security Culture
Emad Sherif, Steven Furnell, Nathan Clarke, Plymouth University, United Kingdom.
- Factors Contributing to Performance for Cyber Security Forensic Analysis
Shelby Hopkins, Andrew Wilson, Austin Silva, Chris Forsythe, Sandia National Laboratories, United States.
Top |
13:30 – 15:30 |
S065: The Future of Voting: Integrating Usability and Security Chair(s): Mary Frances Theofanos, Shanee Dawkins, National Institute of Standards and Technology (NIST), United States Room: SAN FERNANDO |
- Personalized Voting: The Intersection of Cloud and Mobility
Shanee Dawkins, National Institute of Standards and Technology (NIST), United States; Sharon Laskowski, National Institute of Standards and Technology, United States.
- Users’ Mental Models for Three End-To-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II
Claudia Acemyan, Philip Kortum, Mike Byrne, Dan Wallach, Rice University, United States.
- Poll Workers and Election Integrity:
Security as if People Mattered
Whitney Quesenbery, Dana Chisnell, Center for Civic Design, United States.
- Framework for Cloud Usability
Brian Stanton, Mary Frances Theofanos, National Institute of Standards and Technology (NIST), United States; Karuna Joshi, University of Maryland Baltimore County, United States.
- Televoting: Secure, Overseas Voting
Chris Crawford, Naja Mack, Wanda Eugene, Juan Gilbert, University of Florida, United States.
- Security Implications for Personal Assistive Technology in Voting
Sarah Swierenga, Rebecca Zantjer, James E Jackson, Jennifer Ismirle, Stephen Blosser, Graham L Pierce, Michigan State University, United States.
- An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting System
Noluntu Mpekoa, Aaron Bere, Central University of Technology, South Africa.
Top |
16:00 – 18:00 |
S086: Innovative Risk Management Methodologies and Tools for Critical Information Infrastructures (CII) Chair(s): Despoina Polemi, University of Pireaus, Greece Room: SAN FERNANDO |
- Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures
Georgios Stergiopoulos, Athens University of Economics & Business, Greece; Marianthi Theocharidou, EC Joint Research Centre, Italy; Dimitris Gritzalis, Athens University of Economics & Business, Greece.
- Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri Nets
Chrysovalandis Agathangelou, Chryssis Georgiou, Ileana Papailiou, Anna Philippou, Loukas Pouis, Georgios Tertytchny, Despina Vakana, University of Cyprus, Cyprus.
- Towards a Successful Exercise Implementation – A Case Study of Exercise Methodologies
George Makrodimitris, University of Piraeus, Greece; Christos Douligeris, University of Pireaus, Greece.
- CYSM: An Innovative Physical/Cyber Security Management System for Ports
Spyros Papastergiou, Despoina Polemi, University of Pireaus, Greece; Athanasios Karantjias, SingularLogic S.A, Greece.
- Business and Threat Analysis of Ports’ Supply Chain Services
Spyros Papastergiou, Despoina Polemi, University of Pireaus, Greece; Ioannis Papagianopoulos, Pireaus Port Authority, Greece.
- XACML Privacy Policy Editor for Critical Infrastructures
Nils Ulltveit-Moe, University of Agder, Norway; Henrik Nergaard, University of Agder, Grimstad, Norway; Terje Gjøsæter, University of Agder, Norway; Jennifer Betts, Queens University Belfast, United Kingdom.
Top |